The Complete Malware Removal Guide

Think your Windows computer might be infected? Clean it up yourself with a variety of free tools, using this “Operation Cleanup: Complete Malware Removal Guide”.

This malware removal guide outlines not only how to remove malware from your computer but also how to clean up the mess that viruses and malware leave behind.

This guide will help you clean your computer of malware. If you think your computer is infected with a virus or some other malicious software, you may want to use this guide. It contains instructions that, if done correctly and in order, will remove most malware infections on a Windows operating system.

It highlights the tools and resources that are necessary to clean your system. Malware is a general term for any malicious software, including viruses, trojans, rootkits, spyware and adware.

Table of Contents


§2–Preparation for Removal


§3–The Removal Process

§4–After the Removal Process

§5–Fix Post-Disinfection Problems

§6–Get Expert Analysis


§8?–?Further Help

1. Introduction

This guide will help you clean your computer of malware. If you think your computer is infected with a virus or some other malicious software, you may want to use this guide. It contains instructions that, if done correctly and in order, will remove most malware infections on a Windows operating system. It highlights the tools and resources that are necessary to clean your system. Malware is a general term for any malicious software, including viruses, trojans, rootkits, spyware and adware.

Many different symptoms indicate a malware infection. Sometimes, the symptoms can be difficult to detect. Below is a list of symptoms you may experience when you are infected with malware:

• Your computer shows strange error messages or popups.

• Your computer takes longer to start and runs more slowly than usual.

• Your computer freezes or crashes randomly.

• The homepage of your web browser has changed.

• Strange or unexpected toolbars appear in your web browser.

• Your search results are being redirected.

• You start ending up at websites you didn’t intend to go to.

• You cannot access security related websites.

• New icons and programs appear on the desktop that you did not put there.

• Your desktop background has changed without your knowledge.

• Your programs won’t start.

• Your security protection have been disabled for no apparent reason.

• You cannot connect to the internet or it runs very slowly.

• Your programs and files are suddenly missing.

• Your computer is performing actions on its own.

Disclaimer: This guide is for informational purposes only and is not a substitute for professional malware removal. Your use of this information is at your own risk.

I recommend that you back up all your important data before attempting to perform the malware removal process. In the unlikely event that something goes wrong, you can restore your data. Do not back up any system files, installers (.exe), or screensavers (.scr) because they may be infected by malware.

How do I back up my data?


1. Several steps may need repeated a number of times in order to remove all threats.

2. In some cases, the only way to remove a malware infection is to do a complete reformat and reinstall of the operating system.

3. You may want to print out or make a copy of these instructions so that you may easily refer to them if needed.

2. Preparation for Removal

2.1 Reset Proxy Settings (Internet Connection Problems)

Some malware infections will turn on a proxy setting, which can prevent you from accessing the Internet or downloading tools required for disinfection. It can also cause redirects. Follow these instructions to reset the proxy settings:

Go to the Start menu, click Control Panel, and then double-click Internet Options. Go to the Connections tab, and click LAN settings. Uncheck the first box under Proxy Server, and then click the OK button to close the screen.

Alternatively, you can go to the Start menu, click Run, type inetcpl.cpl, and then click OK. Then continue with the instructions given above where you click the Connections tab.
how to remove malware

3. The Removal Process

If you have a malware infection that is blocking Internet access, disabling the desktop, or preventing programs from running, you will need to boot into safe mode. Some malware infections will not run in safe mode, thus allowing easier detection and removal.

To access safe mode, restart your computer and start tapping the F8 key before Windows begins to load. You will see a black screen with a number of options. Use the arrow keys to select the Safe Mode with Networking option, and then press the Enter key. Once you are in Safe Mode with Networking, move on to Step 1.
how to remove malware
For a detailed tutorial on how to start the computer in safe mode, visit How to Start in Windows Safe ModeHow To Start In Windows Safe Mode & Its Uses How To Start In Windows Safe Mode & Its UsesREAD MORE

If safe mode is disabled or if for some reason you cannot get into safe mode, skip down to Can’t Boot Into Windows or Safe Mode?

3.1 Step 1 – Automatic Preliminary Rootkit Scan

You need to scan your computer for possible rootkits before running other anti- malware software.

TDSSKiller is an anti-rootkit tool from Kaspersky. It is specially designed to remove malware belonging to the rootkit family Rootkit.Win32.TDSS. This rootkit family downloads and execute other malware, delivers advertisements to your computer, and blocks programs from running. It also redirects Google searches as well as blocks access to security sites. TDSSKiller is simple to use and requires no installation.

Download and run TDSSKillerDownload here or hereHomepage

To run TDSSKiller, follow these instructions:

When the program opens, click the Start scan button. The scan time is very short (less than a minute). If the scan completes with nothing found, click Close to exit. If malicious objects are found, the default action will be Cure. Click on Continue. If suspicious objects are found, the default action will be Skip. Click on Continue. It may ask you to reboot the computer to complete the disinfection.
how to remove malware
If TDSSKiller does not run, try renaming it. To do this, right-click on the TDSSKiller icon and select Rename. Give it a random name with the .com file extension (e.g. If you still cannot run TDSSKiller after renaming it, try running FixTDSS from Symantec. If FixTDSS does not work, you will need to use RKill to terminate malicious processes.

3.2 Step 2 – Scan and Clean (On-demand Scans)

There are many malware cleaner tools that will scan for and remove various malware infections. Unfortunately, none of them will detect and remove 100% of all malware; therefore, it is important to use more than one, in the hope that their combined detection is enough to find the problem.

Below are three highly recommended on-demand scanners. They do an excellent job at detecting threats and completely removing them.

Important notes:

• Make sure the scanners are updated before you scan with them.

• After you have downloaded and updated the on-demand scanners, disconnect your Internet connection. This will eliminate the possibility of any further malware installing on your computer.

• Do not use your computer for anything else until the scanning process has finished.

• Some of these scans may take over an hour to run.

• Do NOT run more than one scan at a time.

• You may need to restart your computer to complete the removal process.

• If you cannot run any of the scanners below, you will need to use RKill to
terminate malicious processes.

Download and install MalwarebytesDownload here or here (

Open Malwarebytes and perform a quick scan. You can also perform a full system scan, but that is optional.
malware removal guide
Once the scan is complete, remove all found infections.
malware removal guide
Malwarebytes is designed to run best in Windows normal mode. If you can run it in normal mode, then you should. If you cannot run it in normal mode, run it in safe mode. However, once you have the system running better, you should scan again in normal mode.

If Malwarebytes will not install, simply rename the downloaded file (mbam- setup.exe) to iexplorer.exe or winlogon.exe. Once you rename it, try running it again. If that does not work, skip down to SuperAntiSpyware. After you scan with SuperAntiSpyware, try installing Malwarebytes again.

Download and run SuperAntiSpyware PortableDownload hereHomepage

Why, you might ask, am I using the portable version? Because it requires no installation, contains the latest definitions, and automatically gives you a random filename, so malware can’t block it from running.

Select the Complete Scan option, and then click the Scan your Computer button to start scanning your computer.
malware removal guide
Download and run Hitman Pro – Download here (32-bit), (64-bit) – Homepage Requires no installation.

Hitman Pro requires a working Internet connection to detect malware.

When the program opens, simply click the Next button.
malware cleaner
Click the Next button again.
The scan should complete within a few minutes and display a list of threats. Click the Next button to delete the threats.

Note: TDSSKiller, SuperAntiSpyware, and Hitman Pro are portable programs, which means they can run directly from a USB flash drive. You can take them anywhere and use them on any computer.

The Office Worker’s 101 Guide to a USB Thumb Drive

3.3 Step 3 – Run a Full Antivirus Scan

If the on-demand scan fails to find anything or if it finds malware that it can’t delete, it is time to launch a full antivirus scan.

If you currently have antivirus software installed on your computer, make sure it is up to date with the latest virus definitions, and perform a full system scan with it. Remove or quarantine everything that it finds.

Before removing anything, make sure it’s not a false positive. “A false positive is when antivirus software identifies a non-malicious file as a virus.” In other words, false positives are mistakes made by an antivirus. If you suspect a file to be a false positive, go to VirusTotal or Jotti’s malware scan and upload the file. They will scan the file with several antivirus engines

If you do not have antivirus software installed, get it immediately. Avast! and Microsoft Security Essentials are two highly recommended antivirus programs. You

should only have one antivirus program running on your computer.

Best Free Antivirus Software

4. After the Removal Process

4.1 Clean up System Restore

Your “restore points” may contain malware. The only way to remove the malware is to delete the restore points. This will remove any old points that contain malware. You can use Disk Cleanup to remove all but the most recent restore point. Follow these instructions to run Disk Cleanup:

Go to Start menu > All Programs > Accessories > System Tools and then click Disk Cleanup. Click on the More Options tab and locate the section near the bottom labeled System Restore. Click on the Cleanup button.

Here’s another way to open Disk Cleanup: Click the Start button . In the search box, type disk cleanup, and then, in the list of results, click Disk Cleanup.

4.2 Change All Passwords

Some malware infections will steal your personal data such as passwords, emails, and banking information. Change all your passwords immediately, especially if you do any banking or other financial transactions on the computer. Password Strength Checker

4.3 Clean up Temporary Files

After the removal process, you need to remove your temporary files. Removing your temporary files will delete the remaining malware files from the temp folders. It will also free up hard disk space, which will help to speed up your computer.

If you are experiencing problems like missing files or folders, skip this step and go on to Fix Post-Disinfection Problems.

Download TFC (Temp File Cleaner)Download hereHomepage If you have CCleaner installed, you can use that instead, but do not use the registry cleaner.

Once downloaded, double-click TFC to open it. TFC will close all open programs when run, so make sure you have saved all your work before you begin. Click
the Start button to begin the process. Once it’s finished, it should automatically reboot your computer. If it does not, manually reboot to ensure a complete clean.

5. Fix Post-Disinfection Problems

Once you have removed the malware infection from your computer, you may experience some annoying problems. Fortunately, there are easy ways to

fix these problems.

5.1 Cannot Open or Run Programs (.exe files)

This problem occurs when your .exe file associations are broken. This is usually caused by malware that changes the default file associations in Windows. Follow these instructions to fix this problem:

Download exeHelper from one of these two links: Link 1, Link 2 Double-click on exeHelper to run the fix. A black window should pop up.
malware cleaner
Press any key to close, once the fix is completed.

If exeHelper does not work, follow the instructions provided in the following links:

Unable to Start a Program with an .exe File Extension (Windows XP)

Repair Broken File Associations in Windows Vista or Windows 7

5.2 I’m Being Redirected to Random Websites

If you’re having a problem with redirects, your hosts file may be corrupted. In order to fix this problem, you have to reset the hosts file back to the default. To reset the hosts file automatically, simply go to How do I reset the hosts file? and click the Fix it button. Then follow the steps in the Fix it wizard.
malware cleaner
If you still have redirect issues after resetting the hosts file, try running GooredFix. GooredFix fixes Firefox browser redirection problems. If you do not use Firefox, you can skip this. Download GooredFix and save it to your desktop. Close Firefox first, and then run the tool. When prompted to run the scan, click Yes. Once the scan is complete, a log will appear; you can close it. Open Firefox and see if you have redirects.

If you still have redirect issues after trying all of the above, your router may be hijacked by malware. In order to fix this problem, you have to reset your router to its default settings. How to Reset a Router Back to the Factory Default Settings

5.3 Repair System Settings

SuperAntiSpyware includes a repair feature that allows you to repair or restore various settings, which are often changed by malware infections. It can repair broken Internet connections, Desktops, Registry editing, Task Manager and more. You can find the repair feature by clicking the Repairs button at the main menu.

5.4 Web Browser Hijacked

Malware will usually try to hijack and redirect your web browser. Your homepage and default search may be changed. Open your web browser options, and correct the choices. How to Change Browser Settings

5.5 Unhide All Files / Restore Quick Launch and the Start Menu

Some malware infections will hide all the files on your computer from being seen. To make your files visible again, download Unhide.exe to your desktop.

Once downloaded, double-click on Unhide and allow it to run. It will remove the hidden attribute on all files and attempt to restore Quick Launch and Start Menu items to their proper location.

Restore Default Start Menu Shortcuts in Vista or Windows 7

You may also want to use Re-Enable, which can undo many changes made by a malware infection.

6. Get Expert Analysis

If you want to be certain that your computer is fully cleaned or just want a second opinion, you can create a topic at one of the forums listed below and ask for help. These forums have people who are well trained and experienced in malware removal. Be sure to mention in your topic that you followed this guide. Please note that it may take a couple of days to receive a reply, so be patient.

Malware removal forums: Bleeping Computer, Geeks to Go, What the Tech, Tech Support Forum, MalWare Removal

6.1 Can’t Boot Into Windows or Safe Mode?

If the malware infection is so severe that you cannot boot into Windows or safe mode, then I recommend using an antivirus rescue CD. An antivirus rescue CD is a bootable CD that can be used to scan your computer for malware without having to boot into the operating system. Many antivirus companies provide free rescue CDs. They are extremely effective at removing malware.
Below are three highly recommended antivirus rescue CDs.

Avira AntiVir Rescue System (230 MB) – How to create and use Avira Rescue CD

Kaspersky Rescue Disk (197 MB) – How to create and use Kaspersky Rescue Disk

Dr.Web LiveCD (170 MB) – How to create and use Dr.Web Live CD

• Burn the antivirus ISO file to a CD using CD burning software.ImgBurn – Easy & Free CD and DVD Burner App ImgBurn – Easy & Free CD and DVD Burner AppREAD MORE

• Insert the CD into the infected computer’s CD-ROM drive.

Enter the computer’s BIOS, set it to boot from the CD, and reboot the computer.

• Scan the computer with the rescue CD.

Read 51 Uses For Live CDs for more information about Live CDs.

If all else fails, you must reformat your hard drive and reinstall Windows. When should I re-format? How should I reinstall?

7. Conclusion

Your computer should be fully cleaned of all malware after following this guide. If you believe your computer is still infected, seek professional help to remove the malware. If you have any questions or comments regarding this guide, you can contact me by email: You can also reach me at my website: Real Security

HackerProof: Your Guide To PC Security by Matt Smith

9 Easy Ways To Never Get A Virus by James Bruce10 Easy Ways to Never Get a Virus 10 Easy Ways to Never Get a VirusWith a little basic training, you can completely avoid the problem of viruses and malware on your computers and mobile devices. Now you can calm down and enjoy the internet!READ MORE

7 Common Sense Tips to Help You Avoid Catching Malware

7. Further Help

7.1 Perform an Online Malware Scan

If you believe your computer is still infected, you can perform an online scan of your computer. Both ESET and F-Secure provide a good second opinion on whether you are infected.

ESET Online Scanner

F-Secure Online Scanner

7.2 Additional Malware Detection / Removal Tools

Some of these tools are advanced, so use caution when using them.

Kaspersky Virus Removal Tool (AVPTool): utility designed to remove all types of infections from your computer.

Microsoft Safety Scanner: a tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software.

Microsoft Standalone System Sweeper: a recovery tool that can help you start an infected PC and perform an offline scan to help identify and remove malware.

aswMBR: a rootkit scanner that scans for TDL4/3, MBRoot (Sinowal) and Whistler rootkits (by Avast).

SARDU (Shardana Antivirus Rescue Disk Utility): combines all of your bootable antivirus ISO images and turns them into a single ISO with a boot menu.

TaskManager.xls: a simple task manager implemented in Excel/VBA. It can list processes, terminate, suspend and resume selected processes. It can be useful when fighting malware that prevents you from using Task Manager or Process Explorer.

7.3 Notable Links

The 9 Types of Computer Viruses To Watch Out For & What They DoThe 7 Types of Computer Viruses to Watch Out For & What They Do The 7 Types of Computer Viruses to Watch Out For & What They DoWhile your computer won’t need a week in bed and antibiotics, computer viruses can delete and steal your data. Let’s take a look at 7 of the most common viruses out there right now.READ MORE

3 Best Resources To Find Sites That Are Known To Have Spyware & Viruses

Guide Published: August 2011

Source: The Complete Malware Removal Guide

Posted in science and technology | Tagged , , | 1 Comment

The Greatest Scam of All Time — Money and Markets – Financial Advice | Financial Investment Newsletter

Martin D. Weiss, Ph.D. | Monday, September 18, 2006 at 8:00 am

Washington’s Enron-style accounting is now so widespread and so deeply ingrained, the nation could be bankrupt and not even know it.

You go to work. You save and invest. You vote in the November election. And you assume that everything is business as usual. Then, one day, you wake up to the shocking discovery that it’s not.

Inflation is at least three percentage points worse than what they’re telling you. Unemployment and the budget deficit is over double. The national debt is at least five times bigger than official tallies.

Almost every number coming out of Washington has been thoroughly massaged and greatly distorted, almost always with a bias toward sweeping the dirt under the carpet and sugarcoating the truth.

This is not a conspiracy. It just happens naturally. But that doesn’t diminish the potential impact on your money. It’s easily the greatest scam of all time.

Every single administration — from John F. Kennedy to George W. Bush — has succumbed to the same temptation to “reform” the data collection process … “streamline” the reporting procedures … and continually implement minor, incremental changes — all to make things look a bit better.

Each new change has been grandfathered in by the next administration.

And the cumulative effect of all these small changes over time adds up to a gross distortion of reality that could directly threaten your financial future.

Look Back to Recent History,
And You’ll See What I Mean.

At Enron, 21,000 employees — and many more investors — assumed that the company’s books were real. Then, one day they discovered it was all a hoax.

And it was over.

We saw the same thing happen at Adelphia Business Solutions, Global Crossing, Kaiser Aluminum, Kmart, McLeodUSA, National Steel, WorldCom, and scores of other major, household-name companies. Every one had distorted its numbers. Every one went bankrupt. Each left a trail of ruined lives in its wake.

The distortions were so bad even many of Wall Street’s least biased analysts missed the boat. Indeed, in a special report I presented to the National Press Club, I demonstrated that …

Among 50 major Wall Street firms we reviewed, 94% continued to publish “buy” or “hold” ratings on these failing companies right up to the day the companies filed for bankruptcy.

Worse, America’s largest auditing firms looked the other way, or even directly assisted in the accounting distortions. In a report I submitted to Congress, I showed that …

Arthur Andersen, America’s most prestigious auditors, gave a clean bill of health to 11 companies involved in accounting irregularities. Deloitte & Touche and KPMG each gave a clean bill of health to five companies involved in accounting problems. And overall, the nation’s major auditing firms gave a clean bill of health to 42.1% of the public companies that filed for bankruptcy soon after their audits. Overall, the auditors failed to warn the public about companies that were worth a total of $225 billion at their peak. Investors lost nearly every dime.

Today, Fannie Mae, the company that controls most of America’s secondary mortgage market — a company without which the entire housing industry would crumble — is also knee-deep in accounting distortions.

Ford, General Motors and Chrysler, which can make or break America’s industrial economy, may or may not have major accounting issues. But their assurances to shareholders and employees, made just a few months ago, are crumbling just the same.

And this is in “good times,” when the economy is apparently strong, when inflation and unemployment are supposedly moderate.

Something doesn’t fit. Something’s terribly wrong with this picture, and it’s this: The government’s distorting the real truth about the U.S. economy and its own books.

How Washington’s Enron-Style Accounting Makes
The Great Corporate Scandals of This Decade
Look Like Little White Lies by Comparison

Much like major auditing firms review the books of a GM or IBM, the U.S. Government Accountability Office (GAO) audits the books of Uncle Sam, including its departments and agencies.

But in its latest year-end media advisory, the GAO plainly states that

“For the ninth straight year, the U.S. Government Accountability Office (GAO) is unable to provide an opinion as to whether the consolidated financial statements of the U.S. government are presented fairly, in all material respects, in conformity with generally accepted accounting principles.”

In other words, the same government that is aggressively pursuing corporations for bad accounting is the most guilty of similar practices.

In an earlier report to Congress, GAO Director and U.S. Comptroller General David M. Walker bluntly explained it this way:

“The current system of federal financial reporting provides an unrealistic and even misleading picture of the government’s overall performance and financial condition … A key lesson from Enron, WorldCom and other business failures is that our free-market system depends on public confidence in the accuracy of … financial information.”

But, unfortunately, Washington has so far failed to learn that lesson.In several departments of the executive branch, especially Defense, balance sheets don’t balance and taxpayer money disappears. So beyond the deficit manipulations that we know about, there could be many others that are unknown, even to the federal auditors.

This is easily one of the greatest scandals of our time, and yet it’s rarely discussed and often forgotten.

Investors and

One veteran economist, John Williams, is so thoroughly convinced that government manipulations are hoodwinking taxpayers and investors, he has devoted his current career to painstakingly documenting the shenanigans at Shadow Government Statistics (

Technically speaking, these issues are not hidden. The government does tell you nearly everything it’s doing — in a long series of cryptic footnotes. But after 40 years of footnotes, most are long forgotten, even by many of the government’s own economists. Here’s a brief rundown of just the most obvious distortions …

Distortion #1
The True Unemployment Rate Is Over 12%

One of the first new wrinkles in the unemployment stats was added during the Kennedy Administration. And it persists to this very day.

Instead of measuring how many people are actually out of work, they figured it would be easier to simply keep track of how many people are applying for jobless benefits.

Never mind the fact that the benefits run out after 26 weeks! Never mind the hundreds of thousands of “discouraged” workers who have stopped collecting benefits months ago!

The government’s unemployment number also excludes millions of part-time workers who are seeking a full-time job but can’t find one … millions more who are disabled … and even the 2.2 million that are in prison.

Make sense? Not quite. If Mr. A loses his job because he’s fired, he’s “unemployed.” But if Mr. B loses his job because he’s thrown in jail, he’s not unemployed!? Give me a break.

So what is the true unemployment rate in the United States including all those who really want a job but don’t have one?

I can assure you it’s not the 4.7% that the Bureau of Labor Statistics reported for August. It’s probably closer to 12%, or over two and a half times more than the official rate.

Distortion #2
The True Inflation Rate Is Over 7%

Probably more so than any other number, the government has a direct, vested interest in keeping its official inflation numbers low.

Reason: The higher the rate of inflation, the more it has to pay in Cost of Living Adjustments to Social Security beneficiaries.

The first major push for inflation-distorting reform began with the Clinton Administration. Until then, the inflation measure was based on an essentially fixed basket of goods.

Example: The basket included an 8-ounce steak. And no matter what, they tracked the same steak through time.

The Clinton Administration, however, argued for a variable basket of goods. If the 8-ounce steak got to too expensive, they argued, the typical consumer would simply substitute hamburger. So the government should do the same.

That wouldn’t be a measure of the cost of living. It would be a measure of the cost of survival. Yet, according to Williams, a series of complex mathematical changes in how the Consumer Price Index is calculated — giving less weight to higher priced items — essentially achieves the same goal as the variable basket of goods.

Add that to a series of other distortions in the Consumer Price Index … and you’ve got a measure that’s so far removed from reality, it’s a joke. Instead of the 3.8% announced last week, the true inflation rate could be well over 7%.

The biggest victims of this hoax: Anyone collecting Social Security benefits. According to Williams, if the Consumer Price Index were calculated today the same way it was during the Carter Administration, the payments would be 70% larger!

Distortion #3
Gross Domestic Product
Greatly Overstated

Back in 1991, the U.S. government stopped focusing on the Gross National Product (GNP) and started headlining the Gross Domestic Product (GDP). A key difference: The payments the government must make to service the national debt are missed in the GDP numbers.

Separately, the government always reports the growth in GDP after subtracting inflation.

Example: If the GDP growth is 8% and inflation is calculated at 4%, the government reports that GDP growth is 4%.

But if the true inflation rate is 7%, then guess what: Instead of moving along at a reasonably healthy clip of 4%, the economy is actually crawling at a feeble rate of 1%.

Big difference!

No matter what, right now, even the overstated rate is slipping: The government reports that GDP growth fell to annual rate of just 2.9 percent in the second quarter of 2006.

Distortion #4
Deficits and Debts

The official 2005 budget listed the U.S. federal deficit at $319 billion.

But according to the GAO, if the government followed the same generally accepted accounting principles it demands of corporations, the real 2005 deficit would have been $760 billion — or more than DOUBLE the official number.

And that’s just one year of new debt the government has to take on to make ends meet.

If you take a look at the total debts and obligations the government has accumulated over the years, the picture gets worse, much worse.

At the end of the first quarter, the total federal debt, including government agencies and government-sponsored enterprises, stood at $10.2 trillion. (In the Fed’s Flow of Funds report of June 8, 2006, see Table L.4. Then sum lines 4 and 5.)

But if you also include the estimated unfunded liabilities for Social Security, Medicare and other programs, the total federal debt is at least $54 trillion.

And that’s based on three separate studies — by the American Enterprise Institute (AEI), the National Center for Policy Analysis (NCPA) and the Brookings Institute.

My Recommendations

First, don’t take government stats for granted. If you can’t trust Ford and Fannie Mae, what makes you think you can trust Uncle Sam?

At the very least, recognize that the government has a built-in institutional and methodological bias in favor of good news. It’s simply not prudent to base your long-term financial future upon them.

Second, take steps to protect your assets from the ravages of inflation, whether hidden or not. That includes a continuing allocation to gold- and energy-related investments, despite any temporary ups and downs.

Third, keep a substantial portion of your money as safe as possible to protect yourself from the day when the truth starts pouring out. It hasn’t happened yet. But just as occurred with Enron and WorldCom, once the bubble of fantasy bursts, it doesn’t take long.

My favorite havens: Treasury-only money market funds such as:

American Century Capital Preservation Fund (800-345-2021),
Dreyfus 100% U.S. Treasury Fund (800-645-6561),
Fidelity Spartan U.S. Treasury Fund (800-544-8888),
USGI U.S. Treasury Securities Cash Fund (800-873-8637),
Vanguard Treasury MMF (800-662-7447), or
Weiss Treasury Only Money Fund (800-430-9617).

Although government officials may distort the numbers, the U.S. Treasury Department has never failed to meet its obligations for the payment of principal and interest.

Good luck and God bless!



MONEY AND MARKETS (MaM) is published by Weiss Research, Inc. and written by Martin D. Weiss along with Sean Brodrick, Larry Edelson, Michael Larson, Nilus Mattive, and Tony Sagami. To avoid conflicts of interest, Weiss Research and its staff do not hold positions in companies recommended in MaM. Nor do we accept any compensation for such recommendations. The comments, graphs, forecasts, and indices published in MaM are based upon data whose accuracy is deemed reliable but not guaranteed. Performance returns cited are derived from our best estimates but must be considered hypothetical inasmuch as we do not track the actual prices investors pay or receive. Regular contributors and staff include John Burke, Amber Dakar, Monica Lewman-Garcia, Wendy Montes de Oca, Kristen Adams, Jennifer Moran, Red Morgan, and Julie Trudeau.

Attention editors and publishers! Money and Markets issues can be republished. Republished issues MUST include attribution of the author(s) and the following short blurb: This investment news is brought to you by Money and Markets. Money and Markets is a free daily investment newsletter from Martin D. Weiss and Weiss Research analysts offering the latest investing news and financial insights for the stock market, including tips and advice on investing in gold, energy and oil. Dr. Weiss is a leader in the fields of investing, interest rates, financial safety and economic forecasting. To view archives or subscribe, visit

From time to time, Money and Markets may have information from select third-party advertisers known as “external sponsorships.” We cannot guarantee the accuracy of these ads. In addition, these ads do not necessarily express the viewpoints of Money and Markets or its editors. For more information, see our terms and conditions.

© 2006 by Weiss Research, Inc. All rights reserved.
15430 Endeavour Drive, Jupiter, FL 33478

Source: The Greatest Scam of All Time — Money and Markets – Financial Advice | Financial Investment Newsletter

Posted in economics, Government related, taxes | Tagged , , , , | Leave a comment

Saudis shut down camel urine shop: owner was selling his own urine

Some hadiths depict Muhammad touting the medicinal benefits of drinking camel urine. This one also shows him in his full compassionate, merciful glory: “The climate of Medina did not suit some people, so the Prophet ordered them to follow his shepherd, i.e. his camels, and drink their milk and urine (as a medicine). So they followed the shepherd that is the camels and drank their milk and urine till their bodies became healthy. Then they killed the shepherd and drove away the camels. When the news reached the Prophet he sent some people in their pursuit. When they were brought, he cut their hands and feet and their eyes were branded with heated pieces of iron.” (Bukhari 9.76.5686)

And so drinking camel urine is just as much a matter of obeying Muhammad (as the Qur’an repeatedly exhorts Muslims to do; see 3:32; 3:132; 4:13; 4:59; 4:69; 4:80; 5:92; 8:1; 8:20; 8:46; 9:71; 24:47; 24:51; 24:52; 24:54; 24:56; 33:33; 47:33; 49:14; 58:13; 64:12) as is waging jihad and subjugating Infidels (see Qur’an 9:29). But this wily shop owner tried cutting costs by using his own product instead, and is now getting his comeuppance.

camel urine

“Saudi authorities close down shop selling traditional camel urine drinks… after discovering the owner had been filling the bottles with his own bodily waste,” by Julian Robinson, MailOnline, December 22, 2015 (thanks to Robert):

Saudi authorities have closed down a shop selling traditional camel urine drinks after discovering the owner had been filling the bottles with his own bodily waste.

Health inspectors swooped on a vendor in the port city of Al Qunfudhah, in south-western Saudi Arabia, and confiscated more than 70 full bottles.

The practice of drinking camel’s urine mixed with milk is believed to date back centuries while some insist it has health benefits.

But the shopkeeper’s business was closed down indefinitely amid claims he had been selling his own urine to unsuspecting customers.

The traditional camel urine drink is believed to have originated from a passage in the Hadith.

Source: Saudis shut down camel urine shop: owner was selling his own urine

Posted in diet and nutrition, Islam, multiculturalism, Uncategorized | Tagged , , , , , , | 1 Comment

Enthralled by Cultural Marxism

Four Horsemen of The Frankfurt School

By Chuck Morse  –  January 2002

Links with multiple references to Marxism:

Kurt Lewin: “Group Decision and Social Change”

Using dissatisfaction as a tool in social transformation

Bloody Utopian Dreams, Part I: Hammer and Sickle

An Analysis of Community Oriented Policing

“In his new book The Death of the West, Patrick J. Buchanan examines the origin of what he contends is the modern decline of America. He asserts that while Soviet style Marxism is largely dead, our society remains enthralled by Cultural Marxism, which is strangling our freedom, and threatening our future. This threat to our culture and way of life accelerated to a deadly speed with the establishment, in 1933 at Columbia University, of the Institute for Social Research, originally called “The Institute for Marxism.” This institution became known as the Frankfurt School….

“The four horsemen of the school were music critic Theodor Adorno, psychologist Erich Fromm, sociologist Wilhelm Reich and professor Herbert Marcuse. Their ideas, echoing through the halls of academia and from the ink stained hands of writers and journalists, would lead to, as Buchanan calls it, the establishment of today’s politically correct catechism. …

“The original strategy to destroy America, employed by the Frankfurt School, came from Italian Communist Antonio Gramsci who realized that in order to achieve a Socialist victory, cultural institutions would have to be infiltrated and subverted. Gramsci realized that America, steeped in traditions of freedom and liberty, would never to succumb to a frontal assault….

“The Frankfurt School would patent the familiar ‘Critical Theory’ which was accurately defined by a student as the ‘essentially destructive criticism of all the main elements of Western culture, including Christianity, capitalism, authority, the family, patriarchy, hierarchy, morality, tradition, sexual restraint, loyalty, patriotism, nationalism, heredity, ethnocentrism, convention, and conservatism.’ Under Critical Theory, anything emanating from the west is to be libeled and attacked…. All blame for societal and economic ills are to be shifted to the west.

“The saturating drumbeat of Critical Theory would lead to ‘Cultural Pessimism’ which is when a person grows to loathe the society, which nurtured him and provided him unprecedented levels of success…. Adorno’s thesis is that anyone imbued with middle class, conservative, or Christian values is a racist and a fascist….

“The Frankfurt School introduced the idea of psychological conditioning as a means of changing the culture to fit their image…. To Adorno and his comrades, all Americans who refused to conform to the new morality were viewed as mentally ill and in need of treatment. The Soviet Union offers a clear example of this philosophy in action with it’s millions sent to gulags for ‘mental’ maladies such as ‘anti-social’ attitudes….

Brandeis professor Herbert Marcuse, was the pied piper of the sixties as he fostered the development of, as Buchanan points out, ‘radical youth, feminists, black militants, homosexuals, the alienated, the asocial, Third World revolutionaries, all the angry voices of the persecuted ‘victims’ of the West.’ …. He calls for ‘Repressive Tolerance’ which means ‘intolerance against movements from the right, and toleration of movements from the left.’ When the left speaks of tolerance, this is what they mean….

“The Frankfurt School would mainstream the dicktat of the Moscow Central Committee laid down in 1943. This declaration, right from the horse’s mouth, illustrates exactly what were up against: ‘Members and front organizations must continually embarrass, discredit and degrade our critics. When obstructionists become too irritating, label them as fascist, or Nazi or anti-Semitic…The association will, after enough repetition, become ‘fact’ in the public mind.

Read the whole article at Enthralled by Cultural Marxism Four Horsemen of The Frankfurt School

See also Using Dissatisfaction (a crisis) for social transformation

Source: Enthralled by Cultural Marxism

Posted in Collectivism, Communism, Marxism, Mind Control, neoliberals, New World Order, Philosophy, political correctness, social engineering | Tagged , , , , , , | 1 Comment

Vasili Mitrokhin, 81; Copied KGB Spy Files – latimes

Vasili Mitrokhin, the KGB archivist who for 12 years secretly made notes from the Russian spy agency files until he defected to Britain in 1992, has died. He was 81.

Mitrokhin died of pneumonia Jan. 23, the British government announced.

His handwritten notes were hidden in his shoes, buried in milk containers under the floorboards of his dacha or under his back garden, and were smuggled out of Russia by British agents in six trunks. The notes contained multiple revelations about the much-feared KGB’s activities for more than 70 years in the Soviet Union, Europe, Afghanistan and the United States.

Living undercover and under an assumed name in England, he collaborated with Cambridge University historian Christopher Andrew on “The Mitrokhin Archives,” published in the United States as “The Cross and the Shield.” His defection was kept secret until 1999, when the book was published and then serialized on the front page of the Times of London.

The disclosures were “unique in the breadth and quantity of materials,” said Christian Ostermann, director of the Cold War International Historical Project at the Woodrow Wilson International Center for Scholars, who edited and published some of Mitrokhin’s work. “Mitrokhin felt very strongly that the material should be made available to a broader public, and in particular to the Russian public.”

Although the Russian government downplayed the significance of Mitrokhin’s revelations, governments around the world, including the United States, successfully prosecuted several people named in the files, in some cases many years after the espionage had taken place.

Among the disclosures in his files were assassinations, covert operations and a plot to break the legs of ballet star Rudolph Nureyev, who had defected. The KBG files on Afghanistan described violent guerrilla deception campaigns, assassinations, sabotage and bribery.

The KGB also was reported to have supplied weapons to Palestinian terrorists and the Irish Republican Army, spread rumors about the Rev. Martin Luther King Jr., planted a listening device in a Capitol hearing room used by the Senate Foreign Relations Committee and infiltrated U.S. military contractors.

Vasili Nikitich Mitrokhin was born in Yurasov in the Ryazan province. He was an enthusiastic member of the secret agency, he told interviewers after his defection, until after he was transferred from operational activities to the department responsible for the KGB’s archives in 1956.

Disillusioned by Premier Nikita Khrushchev’s secret speech to the Communist congress, in which he denounced Josef Stalin, Mitrokhin began copying, in longhand, everything to which he had access.

He was in a unique position to do so: When the KGB archives were moved from downtown Moscow to a suburban location in 1972, Mitrokhin was in charge of the transfer.

Why take the risk of making notes on the most secret files in the Soviet Union?

“I wanted to show the tremendous efforts of this machine of evil, and I wanted to demonstrate what happens when the foundations of conscience are trampled on and when moral principles are forgotten. I regarded this as my duty as a Russian patriot,” Mitrokhin said in a 1999 interview with the BBC.

After he retired in 1984, Mitrokhin spent eight years transcribing his tiny scribbles into a fuller account of the records he had seen. He told no one, not even his wife, what he had done and was doing. And as the Soviet Union began to collapse, he began to consider the possibility that his notes would someday go public.

In March 1992, he walked into the U.S. Embassy in Riga, Latvia, and asked whether he could defect.

The CIA was not interested. Hundreds of Russian exiles were trying to flee the Soviet Union, Mitrokhin’s documents clearly were not originals and the inconspicuous older man acknowledged that he was just a librarian, not a spy.

So, he tried the British Embassy, pulling his notes from beneath a bag of sausage and bread. There, sipping his first cup of “proper English tea,” according to the Secret Intelligence Service, he was accepted as an MI6 agent, whisked back to Britain with a new identity, a safe house and a pension. The British secret service sent in an agent unknown to the Russians, who dug up and shipped the files that Mitrokhin had buried.

Described as a small, gentle old man whose eyes were intense, Mitrokhin was a man of simple tastes, preferring his own vegetable soup.

He was devastated when his wife, Nina, a physician, died in 1999 of motor neuron disease. They had a son, who survives.

Source: Vasili Mitrokhin, 81; Copied KGB Spy Files – latimes

Posted in Communism | Tagged | Leave a comment

7 Ways to Prevent Car Accidents – Car Maintenance and Car Repairs – DriverSide

by Alison Lakin
Did you know that over 90 percent of crashes are due to human error?[i] None of us plan on leaving the house, getting behind the wheel, and ending up in a car accident, but they can happen to even the most vigilant of drivers. There are certainly some situations that are unavoidable, no matter what you do. However, there are a few ways that you can limit your exposure to potential harm. Here are seven ways to improve your chances on the road.

Stay alert.

As easy as it is to do, you should never switch to auto pilot while driving. That’s a surefire way to slow your response time and decrease awareness. Keep your attention focused on the road ahead and the vehicles around you so your brain can analyze and prepare for any dangerous situations.

This also means that driving drowsy is a big no-no. Studies have shown that sleepy drivers are twice as likely to cause an accident than non-drowsy ones. Your risk of an accident while driving tired is similar to that when driving while intoxicated.[ii] If your eyelids start drooping, pull off the road and either take a nap or grab some caffeine. Be aware, however, that caffeine takes a while to be effective and it eventually wears off. There’s no substitute for sleep in the long run.

Avoid Distractions.

Eating, using your phone, and spending too much time checking in on children in the back seat are all distractions that make you lose focus on the road ahead. It may feel like you’re losing time if you have to stop to grab lunch, make a call, or sort out your squabbling kids in the back, but it’ll mean that you’ll be a safer driver when you get back on the road.

Though texting while driving isn’t illegal in every state, studies have shown that response times while texting or reading text messages are severely delayed.[iii] If you need to communicate while on the road, make a small investment in a Bluetooth device.

Create a buffer zone.

Leaving space between you and the car ahead allows time for braking should the situation demand it. The general rule of thumb is a car length for every 10 miles an hour. Going 60? Try to keep six car lengths distance between you and the vehicle in front.

This also aids in setting up an escape route. You need to be ready for a dangerous situation to occur anywhere on the road, which means you need to have an empty space to steer into. If the cars in front and behind you are getting uncomfortably close, strategically line up with an empty space to the side. This allows you to have a place to steer your vehicle into.

Keep your hands on the wheel.

It’s easy, especially when driving along boring stretches of road or in stop-and-go traffic, to forget that your hands should be on the steering wheel at all times. How else are you going to avoid potential collisions.

Adapt your driving to weather conditions.

Use proper judgment during bad weather. If your vision is limited by fog, you’ll need extra time to perform emergency maneuvers. When the ground is wet, your tires will take longer to bring you to a stop. Make sure you have more room than usual between you and the car in front.

Communicate with others.

Using your turn signals or hand signals is an easy way to tell other drivers what move you’re planning to make. You can create a dangerous situation by maneuvering your vehicle unexpectedly, so tap your indicators well before you intend on turning or changing lanes – it’s not just safe, it’s good manners too. When merging in front of a big-rig at night, signal and then wait for the driver to flash the headlights in approval. By communicating to other drivers your intention, they can adjust their driving to accommodate you. Waving thanks goes a long way as well.

…But don’t depend on them to do the same.

A good defensive driver knows that other drivers can be unpredictable. Watch for erratic driving from the people around you and avoid any vehicle that drifts across lanes, doesn’t signal, or has difficulty maintaining a steady speed.

[i] Reference
[ii] Reference
[iii] Reference


Source: 7 Ways to Prevent Car Accidents – Car Maintenance and Car Repairs – DriverSide

Posted in Uncategorized | Tagged , , , | Leave a comment

5 Uncomfortable Truths About Liberals ^ | March 27, 2012 | John Hawkins

When one becomes a liberal, he or she pretends to advocate tolerance, equality and peace, but hilariously, they’re doing so for purely selfish reasons. It’s the human equivalent of a puppy dog’s face: an evolutionary tool designed to enhance survival, reproductive value and status. In short, liberalism is based on one central desire: to look cool in front of others in order to get love. Preaching tolerance makes you look cooler, than saying something like, “please lower my taxes”Greg Gutfeld

1) Most liberals are hateful people. Who are the most hateful people you can think of off the top of your head? If you’re not a liberal, the first people that probably come to mind are the God hates f@gs lunatics from Fred Phelps’ Westboro Baptist Church. What type of human beings would do sick protests at funerals? Well, liberals have their own version of this. Whenever a prominent conservative gets sick or dies, there’s an orgy of celebratory hatred on the Left. It happened with Reagan, Tony Snow, Breitbart and every other big name conservative in between.

Bill Maher, Barney Frank, Michael Moore, Keith Olbermann, Amanda Marcotte, Ed Schultz, Dan Savage, Ted Rall, Al Sharpton, etc., etc. are some of the most hate-filled people you’ll ever run into outside of a maximum security prison, but liberals consider it to be okay because their hate is aimed at conservatives, who are acceptable targets. This is why liberals felt perfectly comfortable attacking Sarah Palin’s children, harassing Michelle Malkin’s family until they had to move, and publicly posting the addresses of ordinary citizens who opposed Prop 8. They’re hate-filled people who are constantly accusing EVERYONE ELSE of behaving the way they do on a daily basis. So, if you want to find the most hate-filled people in America, look for a liberal lecturing other people about how important it is not to hate people and you’re practically guaranteed to be looking at a hate-filled person.

2) Liberals do more than any other group to encourage race-based hatred. It’s amazing how much we still hear about Nazis and the KKK, even though they’re both marginalized, nearly powerless groups of misfits and losers. On the other hand, how marginalized are the hatemongers on the Left? MEChA is allowed in public schools, Al Sharpton is on TV every night, and Democratic congressmen are still willing to appear on stage with Louis Farrakhan.

But that’s no surprise because promoting racial strife at every opportunity is an actual Democratic campaign strategy. Almost the entire message of the Democratic Party to large swathes of the electorate is, “Everybody who doesn’t look like you hates you except us.” There are plenty of liberals who have jobs almost solely because they’re willing to incessantly shout “racism” to help the Democratic Party. We even have groups of professional grievance mongers like CAIR, La Raza, and the New Black Panther Party that work incessantly to stir up race hatred because it’s good for fund raising and gives them a reason to justify their existence. If the Nazi Party or the KKK had tried to come up with a system to keep people hating each other based on skin color, they couldn’t have ever created anything as effective as the one liberals have now implemented.

3) Most liberals are less moral than other people. You won’t see liberals being accused of being hypocritical if it turns out that they don’t have “good family values,” commit adultery, or don’t live up to their Christian beliefs because they don’t really buy into any of those things. Liberals incessantly attack the church and they seldom talk about morals because if they have no morals, then no one can ever accuse them of being hypocrites. This is also why liberals feel so comfortable lying about conservatives. The standard with liberal blogs, papers, and cable news outlets isn’t accuracy; it is doing damage to conservatives. It’s considered perfectly acceptable amongst liberals to lie about conservatives, Christians, and anybody else who gets in the way of liberalism. The problem for liberals is that you can’t smear and mock people for believing in morals, traditions, and family values while simultaneously credibly claiming to have them yourself.

4) Most liberals don’t care if the policies they advocate work or not. This may seem like an alien concept to a lot of people, but liberals don’t push policies based on whether they improve people’s lives or not. To the contrary, liberals support policies that make them feel good about themselves or alternately, help cement liberals in power. This is why liberals don’t care whether tax revenues go up after a tax cut, whether high taxes on the rich kill jobs, or how high your gas prices go because they don’t want to drill. To liberals, a policy that kills millions but makes them feel good about themselves is a win, not a loss. See the Left’s cut- off of military aid to South Vietnam for one example of that and their opposition to the use of DDT, which is needlessly killing 1.5 million people a year in Africa. Conservatives would be happy to reverse that ban, but it makes liberals falsely feel like they’re good environmentalists to keep it in place; so all those poor people in Africa have to die for no reason other than to prop up the fragile self esteem of pampered left-wingers here in the United States.

5) Most liberals are extremely intolerant. Liberals talk incessantly about tolerance and yet they lash out whenever anyone dares to present a view that doesn’t toe the liberal line. Conservative college speakers usually need extra security because budding liberal fascists often try to shout them down or assault them. Liberals desperately try to censor talk radio, which they don’t even listen to, because they can’t stand the idea that someone else is allowed to have a contrary opinion. Why do you think liberals get so upset about a conservative-leaning news station like Fox News, when ABC, NBC, CBS, MSNBC, and CNN all lean to the left? It’s because liberals don’t think people should be allowed to have an opinion that differs from their own.

Amazingly, if you listen to liberals, you’ll find that they don’t even understand what tolerance is in the first place. Actual tolerance means that you realize people have different practices and views and even if you don’t agree, you understand that they should have the ability to live as they choose, just as you should have the leeway to live as you choose. On the other hand, liberals have a fascistic view of tolerance, which really isn’t surprising since liberalism and fascism are merely different branches of the same tree. To liberals, tolerance is, by definition, whatever their opinion happens to be. So, to be tolerant, you have to agree with them. People who don’t even know what tolerance is shouldn’t be lecturing everyone else on the subject.

Source: 5 Uncomfortable Truths About Liberals

Posted in leftist bullying, liberal intolerance/persecution, liberals, neoliberals, Politics, race card, Victim Culture | Tagged , , , , , , , , , , | 1 Comment